Kerberos Authentication with Veeam v12. NTLM authentication is still mandatory for communication between all Veeam infrastructure servers in v11. However, NTLM authentication is still required for communication between Veeam backup infrastructure servers (backup server, backup proxies, backup repositories, guest interaction proxies, log shipping servers, and mount servers). NTLM was subject to several known security vulnerabilities …
Category: Hardening
Nov 02
Defending Against Crypto-Ransomware with Netwrix
Hi, today we will discuss about data governance and more especially a software called: Netwrix Auditor. Netwrix Auditor is a visibility and governance platform that enables control over changes, configurations, and access in hybrid cloud IT environments to protect unstructured data regardless of its location. The platform provides security analytics to detect anomalies in user …
Oct 19
Conti initiates their attacks on Backup
Cyber groups (cartels) specifically target backup solutions in order to ensure that the victim has no other option except for paying the ransom. Conti group is particularly methodical in developing and implementing backup removal techniques (on-premise and cloud). The full analysis is available here (thanks to ADV INTEL) and is based on their actual proactive …
Mar 22
Veeam Hardened Linux Repository – Part I
Hello, before tackling the subject of your presence, allow me to briefly introduce myself: I am Philippe DUPUIS, I‘m a french Data Management and Security engineer working with Christopher (Be indulgent if you notice some English grammar failures, my mother tongue is French 😊). I specialize in Data Protection and Governance, Disaster Recovery, Security, Cloud …
Nov 23
Protect your Backup against Ransomware
Regular backups of all data, including data on file servers, infrastructure, and critical business applications should be performed. Keep in mind that these backups can also be affected by ransomware. Protect your backup against Ransomware. Indeed, more and more cybercriminals seek to attack backups to limit the possibilities for the victim to find his data …
- 1
- 2